EP1224807A1 - Vorrichtung und verfahren zum kopiergeschützten verteilen elektronischer dokumente - Google Patents
Vorrichtung und verfahren zum kopiergeschützten verteilen elektronischer dokumenteInfo
- Publication number
- EP1224807A1 EP1224807A1 EP00974412A EP00974412A EP1224807A1 EP 1224807 A1 EP1224807 A1 EP 1224807A1 EP 00974412 A EP00974412 A EP 00974412A EP 00974412 A EP00974412 A EP 00974412A EP 1224807 A1 EP1224807 A1 EP 1224807A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- unit
- document
- data
- reconstruction
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims description 28
- 238000013515 script Methods 0.000 claims description 24
- 238000013500 data storage Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 12
- 238000004458 analytical method Methods 0.000 claims description 8
- 238000007792 addition Methods 0.000 claims description 7
- 238000004422 calculation algorithm Methods 0.000 claims description 7
- 230000006870 function Effects 0.000 claims description 7
- 238000011068 loading method Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000004088 simulation Methods 0.000 claims description 2
- 230000004044 response Effects 0.000 claims 1
- 238000000547 structure data Methods 0.000 claims 1
- 238000011161 development Methods 0.000 description 13
- 230000018109 developmental process Effects 0.000 description 13
- 230000000694 effects Effects 0.000 description 13
- 230000005236 sound signal Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 6
- 230000001419 dependent effect Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000001681 protective effect Effects 0.000 description 3
- 238000012549 training Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 208000037855 acute anterior uveitis Diseases 0.000 description 1
- 239000000853 adhesive Substances 0.000 description 1
- 230000001070 adhesive effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000149 penetrating effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000012916 structural analysis Methods 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44236—Monitoring of piracy processes or activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4622—Retrieving content or additional data from different sources, e.g. from a broadcast channel and the Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
- H04N21/47202—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting content on demand, e.g. video on demand
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/478—Supplemental services, e.g. displaying phone caller identification, shopping application
- H04N21/4782—Web browsing, e.g. WebTV
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/61—Network physical structure; Signal processing
- H04N21/6106—Network physical structure; Signal processing specially adapted to the downstream path of the transmission network
- H04N21/6125—Network physical structure; Signal processing specially adapted to the downstream path of the transmission network involving transmission via Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/61—Network physical structure; Signal processing
- H04N21/6156—Network physical structure; Signal processing specially adapted to the upstream path of the transmission network
- H04N21/6175—Network physical structure; Signal processing specially adapted to the upstream path of the transmission network involving transmission via Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00123—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00884—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Definitions
- the present invention relates to a device for copy-protected distribution of electronic documents in a publicly accessible electronic data network, in particular the Internet, according to the preamble of claim 1. Furthermore, the present invention relates to a method for copy-protected distribution of electronic documents, in particular for operating such a device.
- the MP3 file format has developed as a standard, both legally acquired and pirated sites from so-called pirate sites (ie unauthorized pirated servers offering Internet access) ) downloaded MP3 files can be used by a viewer by means of additional programs of common Internet service programs, so-called viewers (i.e. playback devices for such an electronic file).
- the object of the present invention is therefore to provide a device for copy-protected distribution of electronic documents, in particular in a public electronic data network, for example on the Internet, according to the preamble of claim 1, in which, in favor of a document provider, on the one hand only one document user can be achieved can still use authorized electronic documents (usually after a financial transaction has been carried out to pay off the interest of the document provider), and this also creates opportunities to make the further distribution of electronic documents already on pirate sites unattractive and thus to contain them.
- the distribution of electronic documents preferably takes place with the help of Internet document servers, in encrypted form
- the encrypted form of the respective being according to the invention electronic documents looks such that the fact of encryption by the involved computer or computer units cannot be recognized without checking the content of the document in question.
- an encrypted MP3 audio file looks exactly like an unencrypted MP3 audio file with regard to its data format or its file structure, and only by playing (opening) the file with an appropriate player (viewer) shows that the encrypted file produces an unusable, usually completely confusing and meaningless result.
- the procedure according to the invention offers the possibility of using a large number of methods, preferably individually, in each case in the manner according to the invention Avoiding the same encryption results - charging encrypted electronic documents to existing document server units, in particular pirate sites, and thus, depending on the volume and number of encrypted documents uploaded, to ensure that users accessing the server unit in question after multiple determinations that they are tedious and tediously downloaded MP3 audio file (which can reach orders of magnitude of several MBytes with a short, about 3-minute piece of music) is useless, lose interest and may be inclined to electronic documentation purchase legally and unproblematically and not simply delete the encrypted and thus unusable file, but actively use it.
- the present invention also covers this possibility:
- the electronic marking (signature) applied by the signature unit within the scope of the present invention or naturally contained therein identifies the electronic document with regard to the reconstruction file necessary for the document for decryption, so that the document encrypted Adhesive electronic data-related marking (signature) can be used to either directly access the necessary reconstruction file or instructions from the database using the allocation unit (for example in the manner of a relational database system), or to access an (Internet) address received (such as a hyperlink), via which a corresponding reconstruction server can then be addressed as a reconstruction data storage unit with the necessary file.
- the allocation unit for example in the manner of a relational database system
- an (Internet) address received such as a hyperlink
- data-related marking or “signature” is to be understood as an identifying feature of an electronic document, which is used, for example, by calculation (using an algorithm or another function), by extraction, comparison, query of external services or the like is generated and enables a clear, reproducible identifier).
- This link can then be made the basis for a transaction and accounting process in the manner desired for the creator of the electronic document, namely against an accessing user who is looking for the reconstruction file suitable for the electronic signature of the encrypted document downloaded by him, against it Appropriate remuneration and / or registration is made available, whereby this reconstruction file can in particular also perform other control functions, such as a limited right of a user to access the unencrypted document, the right to access only parts of the document (for example, for one Music tracks), etc.
- the present invention offers numerous possible implementations, and audio file formats, such as MP3, should be referred to merely by way of example, also in the following description of an exemplary embodiment.
- the term “document data structure” therefore also includes any one in an electronic one File-occurring, structure or format-inherent, limited information components (also called "data package”); further examples are so-called frames in video or audio files, or individual words or sentences in text documents, which enable content-related or content-related manipulation for the purpose of encryption without changing the data format (data structure) character of the underlying file form changes.
- a particularly favorable way of effecting this encryption in the context of the present invention is the so-called semantic encryption, as disclosed by the applicant in German patent application 199 32 703.3, and which is fully comprehensive with regard to the modalities of the context-dependent and content-dependent encryption the present application is intended to apply.
- the exchange, removal, addition and / or exchange of the individual content-effective components enables the achievement of an encrypted document which, in the manner desired according to the invention, cannot be distinguished in terms of its structure from an unencrypted document, but nevertheless in terms of content - for example as a video sequence with completely disjointed (partially missing) single images or interchanged intermediate images (so-called intraframes) no longer has any use value for an unauthorized user.
- this is implemented by the functionality of the encryption unit, which is able to generate the semantically encrypted volume data together with key data as a reconstruction file from an original electronic document to be protected (namely the original data volume or useful file).
- the analysis unit according to the invention is provided in order to create the prerequisite for a subsequent content-related or meaning-related encryption within the framework of the specified format structure and / or grammar of the original document (e.g. MP3), and the manipulation unit downstream of the analysis unit then takes the core operations of semantic encryption, namely the exchange, removal, addition and exchange, on the information comm WO 01/30080 _ ? _ PCT EP00 / 10256
- the equivalence unit provided in accordance with the further development enables the identification or selection of suitable equivalent information components for this or other operations.
- an operation by the encryption unit takes place taking into account the grammar, the format or the syntax of the original document:
- the manipulation unit provided according to the invention is in fact able through the effect of the preferably provided semantic control unit to generate an encryption result that has a grammatical, format and / or syntactic structure corresponding to the original file, so that there is equivalence not only with regard to the individual information components (e.g.
- words in a text or frames in an MP3 file is, but also in terms of the structures and / or format-based arrangements (for example, the arrangement of terms in a sentence according to the rules of grammar) complies with the rules and so far does not reveal that the locks without a content check effecting operation on the information components has taken place.
- the manipulation unit is assigned a control unit which randomizes the encryption operation (ie the application and effect of the individual encryption operations): by generating and taking into account a random component, for example a random number generated in an otherwise known manner and taking it into account performing a dependent number of encryption operations is guaranteed ensures that encryption of the same original document always leads to a different result, i.e. encryption never produces the same encryption result even under otherwise identical conditions. With this measure, the security of the present invention can be further increased.
- the question of the encryption depth correlates with the number of encryption the basic operations of swapping, removing, adding or exchanging, which effect encryption, and in this respect also determine the volume of the key file generated.
- the user can thus actually determine a security level of the encryption operations to be carried out, although, in contrast to known, conventional encryption methods, the result of the semantic encryption in any case produces an apparently correct (ie formally apparently unencrypted) result, and the question of whether encryption has taken place at all is not possible without checking the content.
- this effect of insecurity achieved for the first time through semantic encryption can even achieve a certain protective effect without a single encryption operation being carried out in the above-described sense.
- the volume data as a document by means of the conversion unit provided for further training, while the key file is generated as executable script data of a suitable script language, for example Visual Basic (Script), Javascript, etc. and can be output, with the advantage that, in particular in connection with network or Internet-based applications, the original data can then be restored in a particularly simple manner, in the simplest case by running the script which directly brings about the restoration (which is carried out via a a suitable connection that takes into account the interest of the person seeking protection has been established).
- a suitable script language for example Visual Basic (Script), Javascript, etc.
- the reconstruction file does not (only) influence the electronic document (and thus makes it usable or unusable), but rather acts directly on the functionality of the playback unit and / or the reconstruction unit:
- the invention here enables the playback functionality to be manipulated (corresponding to the reconstruction functionality at the reconstruction unit).
- Another example was to describe the situation in which a program class or method of the reconstruction or playback object required for playback or reconstruction is brought up individually for backup purposes or selected (from a large number of available ones) in accordance with (preferably as a script file) available) reconstruction data.
- the security effect achieved by the invention lies solely in preventing proper reproduction or its implementation by the reconstruction file with an otherwise unchanged document.
- reconstruction Server unit spokes
- reconstruction Server unit spokes
- the present invention is admittedly special it is preferred to be operated together with a publicly accessible electronic data network, in particular the Internet, but certain embodiments of the invention are also conceivable where, for example, the loading access to the document server unit also takes place locally, and also the access to the reconstruction data storage unit (Reconstruction server unit) and access to the access unit It is also within the scope of the present invention to provide the reconstruction unit locally, but also to provide it alternatively (or simultaneously) on the server side.
- a publicly accessible electronic data network in particular the Internet
- the user who has already obtained a (encrypted) copy of a document server unit determines the fact of the encryption when trying to play it, and then by means of the corresponding functionality of his access software (this would be suitable via plug-in offered to solve in conventional Internet browser programs), first of all - free of charge - by on-line query of the allocation unit to determine whether and where a corresponding reconstruction file exists, and then the server offering the allocation unit (as a database system) either already immediately makes the reconstruction file available for download, or offers a hyperlink to a corresponding, separate reconstruction server.
- the data-related marking also called a signature
- an encrypted electronic document file available for downloading is identified so clearly and electronically that an associated reconstruction file can be found using this signature.
- a preferred way to generate the signature is to use an algorithm (both known and implemented by the provider and the user) to calculate a parameter from the data in the file, which in this respect relates to this file and its structure, in particular the order of the data content , clearly identified. Manipulation in the file, in particular in the order of the data contents, would then lead to the fact that when the signature was (re) calculated, it would be different from the original signature, meaning that not only concrete (encrypted) document files could be clearly identified, but in particular changes to it can also be detected. (In this context, it should also be explained that the calculation or determination of a signature on the client side can also be done passively, in particular by server-side control or query.)
- the signature of the allocation unit which is left to a user when downloading an encrypted file, is made accessible, as a result of which the user is given a path in the manner described how he can do this specifically required reconstruction can obtain file.
- it is therefore preferred to carry out these processes in an automated manner namely primarily the registration of the signature or the query of an assigned path for the reconstruction file, for example by means of the corresponding functionality of the plug-in in the Internet access and playback software of the user.
- a properly restored file namely after obtaining a reconstruction file and merging with the encrypted electronic document, with an individualizing electronic watermark, so that the possibility of tracking unauthorized transfers of the recombined document consists. It is also preferred to implement this watermarking by means of reconstruction instructions contained in the reconstruction file, so that in this case a reconstruction file has a dual purpose: restoration and unambiguous identification of the restored document.
- the generated watermark can also be given a time stamp.
- the characteristic of a watermark is that it can only be recognized by the publisher and that it does not lose the character that identifies its user even with minimal changes to the data.
- the present invention thus offers the possibility of creating a comprehensive system for protecting copyrights to electronic documents in the electronic data network, in particular on the Internet, which has the legitimate interest of the document (content) providers in preventing misuse and possible Compensation with the interest of (honest) users in harmony with the advantages of using the Internet, for example, in order to be able to use the full variety of electronic media at short notice, quickly and conveniently (and thus in turn cost-effectively).
- server-side providers act in an abusive manner, they would inevitably attract attention due to the effort involved and thus also make it easier to combat from the point of view of copyright protection.
- the publisher's responsibility for redistribution ends in accordance with the agreements currently in effect between a publisher and the collecting societies after the transfer and the correspondingly agreed business billing of the data between the publication server and the customer.
- the collecting societies are then mainly obliged to prove the number of direct downloads.
- a fee payable to the collecting society is estimated based on the number of possible retransmissions generated from statistical data. In this sense, a current distribution concept can be described with the metaphor of a publisher's toll booth.
- client software has to be installed by or for the distributed document, which then forces a server contact to reconstruct the unencrypted content, then a user-side or client-side toll station is created, which has further advantages versus a server side.
- client software has to be installed by or for the distributed document, which then forces a server contact to reconstruct the unencrypted content
- a user-side or client-side toll station is created, which has further advantages versus a server side.
- this also gives the opportunity to make remuneration for copyright owners of content protected by means of the present invention fairer and to allocate them, since the present invention, through the acquisition and registration of use, also provides the basis for statistical knowledge about the usage behavior and use of certain electronic documents allows.
- new marketing models can be developed, in which, for example, the use of digital document files (now easier to grasp) is paid for by a server or transmitter as part of advertising or for image reasons.
- Fig. 1 a schematic block diagram of the device for copy-protected distribution of electronic documents acc. a first, preferred embodiment
- FIG. 2 shows a schematic block diagram with an example of implementation of the encryption unit 24 from FIG. 1.
- the system shown graphically in FIG. 1 uses symbolic boundaries 10 to separate a publicly accessible electronic data network, in the present case the world-wide-web (www) as an Internet system 12, from a provider 14, in the present case a provider of electronically Digital audio documents to be distributed via the network 12, or by a user 16, who uses a symbolically shown access unit 18 (usually a computer unit equipped with common Internet access software) in a known manner to a document accessible via the electronic data network 12.
- Server unit 20 can access. This takes place on the basis of generally accessible, customary Internet protocols, for example TCP-IP, HTTP or FTP, the document server unit 20 being used for displaying ner selection of various electronic documents is designed for an accessible by means of the station 18 and to enable subsequent downloading (download) of a selected electronic file.
- the documents offered according to the present exemplary embodiment are so-called sound or music files which are created in accordance with the MP3 file format and via a suitable playback unit 22, which is particularly preferably assigned to part of the user-side access unit 18 or to this, can be played (player or viewer as playback unit; these are suitable for reading the MP3 file format and in turn converting it into sound signals or music; this is also well known from the prior art).
- the MP3 file format consists of a header and a set of data units (data packets, also called frames), each of which contains the music data in compressed form.
- data packets also called frames
- the size and structure of the frames are described in more detail by the header data and are therefore precisely defined.
- each frame compresses a plurality of audio access units (AAU), each of these AAUs standing for a predetermined time period of the audio signal (approximately 8 or 12 msec).
- the temporal audio signal is acc. MP3 standard discretely FFT-transformed, the transformation being carried out on the basis of 32 predetermined frequencies and the data of an FFT transformation being stored in an AAU, as is the usual procedure when generating an MP3 sound file.
- an MP3 sound file stored in the document server unit 20 and made available for access by the user 16 and loaded by the provider 14 of the document server unit 20 is encrypted, specifically by means of an encryption unit 24.
- the encryption consists in the fact that the individual frames of the MP3 file structure are not in the original music the corresponding sequence are interchanged, frames have been removed, additional meaningless frames have been inserted and / or frames have been exchanged from two or more independent sound files, with such an encryption manipulation - hereinafter also called semantic encryption - that actual structure of the MP3 format, namely header and associated frames, has been obtained.
- the playback unit 22 like any other player or viewer unit suitable for MP3 will be able to open and play the MP3 file encrypted in this way.
- the signal received which has been converted back from MP3 to an audio signal, does not make any sense from the user's point of view, since the swaps, exchanges, distances and additions of frames distort the original sound signal in such a way that the original piece of music or the like.
- Content of the MP3 file is no longer usable for a user.
- the provider 14 also carries out the upload (upload) of an encrypted MP3 file into the document server unit 20 in such a way that not only an encrypted version of the MP3 file is present here, but also a large number, for example 1000 or 2000 identical or different encrypted versions of the same piece of music (whereby, as explained, for a user 16 who asks the document server unit 20 with its table of contents or a search engine associated with the offered files, not explained in more detail, the fact of encryption is not recognizable because the MP3 format has also been preserved for the encrypted files).
- This measure is based on the fact that a majority of the document server units which exist on the Internet, for example for offering MP3 music files, are so-called pirate sites, namely those Internet stations which are not provided by a provider authorized by copyright or similar rights To offer music pieces to any user in an authorized manner for any, usually free download, whereby the distribution of the music piece created or represented by the provider can then no longer be controlled by the provider and considerable damage is caused to him.
- a further measure within the scope of the present invention ensures that not only does the described effect prevent or at least thin out the further spread of unauthorized music files (and of course also other electronic document files), the user 16 is also given the opportunity to do so by him to convert the encrypted MP3 document downloaded to the document server unit 20 into an unencrypted version, so that after steps to be described further below, it becomes a legal user (and 14 from the point of view of the provider 14 potentially sales-oriented):
- the provider 14 who has encrypted his MP3 file in the manner described by the encryption unit 24 and loaded it onto the document server unit 20 of the Internet 12, creates an associated reconstruction file with the encrypted form of the file, ie a file that contains the contains the necessary instructions to restore the swapped, exchanged or replaced frames of the MP3 file back to their original form.
- Such a reconstruction file which is individually assigned to an encrypted MP3 file, is uploaded to a reconstruction server unit 26, which is also located on the Internet.
- a possible further development of this embodiment of the invention is that instead of one reconstruction file, a plurality of reconstruction files for restoring len of an electronic document are generated and provided, however, this plurality of reconstruction files differs from one another and is implemented in such a way that only one of these plurality of files enables the original (completely) correct content to be restored, while the further, reconstruction files generated in parallel use together with the reconstruction unit lead to a result, which apparently also corresponds to the original, unencrypted electronic document file, but deviates in content and thus also achieves a certain encryption effect (e.g. by creating unusable passages at certain areas of an MP3 music file, otherwise the file is the original, unencrypted version).
- this plurality of reconstruction files differs from one another and is implemented in such a way that only one of these plurality of files enables the original (completely) correct content to be restored, while the further, reconstruction files generated in parallel use together with the reconstruction unit lead to a result, which apparently also corresponds to the original, unencrypted electronic
- the security effect of the present invention is supplemented by the dimension of the uncertainty on the part of an unauthorized accessor, such as the question of which of the plurality of theoretically possible reconstruction files is actually the correct one, by means of such a plurality of possible reconstruction files provided according to the further training.
- Their correct selection is preferably the result of a properly carried out identification and / or authentication process, which is further preferably implemented using an underlying operating system environment.
- a logical link (and thus the identification and accessibility of the reconstruction file for an MP3 sound file) is achieved by calculating a so-called signature for an encrypted MP3 sound file, i.e. a mathematical algorithm is applied to the encrypted file and the result is created a signature in the form of a character string or a file that is characteristic of the content and order of the content components of the encrypted MP3 file.
- This signature calculated by means of a signature unit 28 on the provider side 14, is uploaded to a signature server unit 30, which is also located on the Internet 12, in such a way that a database unit provided therein, to be queried by the user in the manner of a compliance table, provides a (usually unique) link and can contain and establish a relationship between a signature of an encrypted MP3 document and the name and location (eg link) of an associated reconstruction file.
- the local access unit 18 can then contact the signature server unit 30 in the electronic data network 12 by means of a functional unit 32, preferably embedded in the manner of a plug-in, after a local signature unit 35, which is also assigned to the access unit 18 (or embedded in this) with the locally known (general) algorithm that has calculated the signature applicable to a special (encrypted) and downloaded MP3 file.
- a functional unit 32 preferably embedded in the manner of a plug-in
- a local signature unit 35 which is also assigned to the access unit 18 (or embedded in this) with the locally known (general) algorithm that has calculated the signature applicable to a special (encrypted) and downloaded MP3 file.
- the network access by means of the functional unit 32 then provides the locally calculated signature (by means of unit 35) of the signature server unit 30 in the described embodiment, and the user 16 receives a file name and a file name from the signature server unit 30 by means of the concordance table stored there Access address (link) for the reconstruction file associated with the transmitted signature.
- the user 16 is then able to generate the unencrypted version of the piece of music by the playback unit 22 from the encrypted MP3 file that is available to him, which is usable from the user's point of view, with a reconstruction unit 34 being provided locally for the purpose of decryption which can also be implemented as a plug-in and which - in the manner of a reversal of the function of the provider-side encryption unit 24 - by executing the reconstruction instructions in accordance with the reconstruction file received from the reconstruction server unit removes the encryption.
- downloading the reconstruction file from the reconstruction server unit 26 for the purpose of generating an unencrypted local MP3 sound file is linked to performing a payment or billing process, ie the user usually pays a predetermined amount of money or the like in return, that the reconstruction server unit gives him the opportunity to receive the decryption or reconstruction option that matches the encrypted MP3 file available to him in the manner specified by the signature server unit.
- the user in an otherwise known manner WO 01/30080-20 - PCT / EPOO / 10256
- Identification or billing unit 36 is present, which, in particular also as a functionality of the access unit 18, makes user data available to a billing identification unit 38 assigned to the reconstruction server unit 26 such that the reconstruction server unit 26 and the associated billing / Identification unit 38 identifies the user, for example, their credit card number or the like. Payment modalities can be recorded and a corresponding payment can be booked or booked or offset against an existing credit.
- the aim of the invention to contain an unauthorized distribution of electronic files can thus be effectively achieved: Not only does the (massive) loading of encrypted and thus unusable for users as such MP3 files (without this however would be recognizable without concrete downloading and playing) considerable uncertainty and frustration which, in the event of multiple failures, could certainly have prevented users from further access to a relevant document server unit (pirate site), but beyond that the user is given the opportunity, preferably by means of a billing process decrypt the loaded file and make it usable again.
- the present exemplary embodiment was based on MP3 music files, the present invention is not restricted to this file format, but in principle any electronic file format of an electronic, vulnerable document which offers the possibility of semantic encryption of the type described above is suitable for use of the present invention.
- MP3 obviously has the special problem of massive damage to be expected from illegal distribution, so this exemplary embodiment was chosen.
- MP3 also offers the option of swapping the AAU when decompressing the frames within it, or FFT factors can be changed so that a played audio frequency changes drastically.
- MP3 would also offer the possibility of exchanging audio files in the time interval specified by the AAU or running them in parallel, so that two or more audio signals can be integrated in parallel, possibly in the same file.
- a corresponding reconstruction instruction an associated reconstruction file
- the present invention furthermore offers the possibility, through appropriate design of the user or access-side functional components, to further increase the control over any illegal document files or to procure the origins of illegally obtained documents: it is particularly preferred, the functional unit 32 to train them to automatically select or access the Internet signature server unit 30 after downloading an (arbitrary) MP3 file and to transmit the locally calculated (unit 35) signature of the respective MP3 file; If the MP3 file has just been the subject of an online contact with a document server unit 20, an em path (indicating the link), which indicates the address, could also be transmitted in parallel with the transmission of the signature to the signature server unit the relevant MP3 file comes from. In particular, the determination means for the signature server unit 30 that this is an unknown signature could then trigger further processing steps, such as following up on a potential illegally received (or possibly not encrypted) file.
- the unit 32 can be designed such that, in the course of determining the source of the data, it also captures the names and addresses of the servers (by means of Internet trace technologies) that were used for the transmission of the data. In this way, a profile can be created that can be used to identify those document servers that e.g. through which the encrypted documents could not be penetrated, but which were recognized by the statistics on the signature server as particularly dangerous and comprehensive pirate sites, to be examined more closely. The information found in this way can then be used to provide evidence and be used when the service is switched off at the content providers or when filtering inquiries directed to these sites from the network providers.
- signature server unit 30 and reconstruction server unit 26 are in principle (spatially) separate units on the Internet, it also being provided in particular that a (central) signature server unit provides information on a plurality of different reconstruction server units , it is also possible, in particular, for a provider to integrate the signature server unit and the reconstruction server unit, in so far as the signature server unit already receives a suitable, associated design file upon receipt of a corresponding user request (possibly after a financial transaction has taken place ) can send to the user.
- FIG. 2 shows a schematic block diagram representation of the structure of a key generation and administration device. unit with the associated functional components within the scope of the present invention, which can be used to convert electronic documents to be protected by the inventive technology of semantic encryption into protected volume files and associated key files.
- the embodiment described in connection with FIG. 2 also makes it possible, in particular, not only to generate a set of key data (which leads to the original, correct amount of data when restoring), but rather a plurality of set of key data, so that this aspect also means that a plurality of possible keys is present (one of which in turn leads to a result that is also correct in terms of content and not only apparently correct) the security of the present invention can be further increased.
- FIG. 2 is stored in a memory 52 according to FIG. 2 and is to be semantically encoded in the manner to be described below by the action of the further functional components shown in FIG. 2.
- a read / access unit 54 connected downstream of the document storage unit 52 and which cooperates with a format data unit 56 determines that the above document stored in the storage unit 52 follows the format structure MS-WORD (ideally, the format data unit 56 contains all format or Structure information of common data formats), and accesses the (document-related) format information to the text document in the document storage unit 52.
- the analysis unit 58 downstream of the reading / access unit 54 is now able to analyze and evaluate this on the basis of the document information read by the reading unit 54, the analysis unit 58 firstly breaking down the electronic document into its individual information components and into stores an information component storage unit 60 (in the present example these were the individual words), and in addition the document Recognizes the structure as the structure of two sentences delimited by points and stores this document structure in the document structure storage unit 62 in a disassembled manner.
- the content of the unit 62 is given the character of a document-specific metafile, which can also be accessed by later encryption processes (also possibly only selectively).
- the content of the document structure storage unit could look as follows after the analysis of the source document by the analysis unit:
- the information component storage unit 60 contains information components corresponding to this structural analysis, that is to say words:
- Thomas comes from the cemetery at 4 p.m. The train is punctual.
- an equivalence unit 70 (which in its simplest version can be understood as a table or database of equivalent, ie corresponding and interchangeable terms):
- the content component "Peter” of the original document was replaced by the grammatically equivalent content component "Thomas” has been replaced, while sentence structure and grammar have been retained, but the meaning of the original document has already been destroyed.
- the content component "goes" of the original document has been replaced by the equivalent component "comes”
- the content component "at 8:00 pm” has been replaced by "at 4:00 p.m.”
- the semantic control unit 72 which is also connected to the manipulation unit 64 and influences the described encryption operation, ensured that the encryption result "... comes ... from the cemetery” is grammatically and syntactically correct, so that it cannot be identified as manipulated. (Also the additional "to” would be correct here).
- a key that enables reconstruction in the present exemplary embodiment, information about the words interchanged in each case with their position in the sentence and in the respective content terms
- the associated key file for storage unit 74 could look as follows (in the following example, the reconstruction unit interprets the EXCHANGE command in order to carry out the swap specified in the argument):
- the vocabulary of the command language itself is dynamic and can be changed by functions of a script language; the EXCHANGE command itself could be replaced by any other expression.
- Key file 2 could accordingly begin as follows:
- these two storage units are additionally followed by an output unit 78 which, in a particularly simple manner, processes the key data 74 in the form of a script and can output it as an executable script file 84; this is done with the aid of a conversion unit 80 which, in an otherwise known manner, generates a volume document 82 corresponding to the encrypted version from the volume data of the storage unit 76, and from the index or reconstruction data of the storage unit 74 an independently executable within the framework of a suitable execution environment Structure description, script, e.g. as Javascript, XML, VB-Sc ⁇ pt or the like, and which then automatically processes the volume document 82 when it runs and can return it to the original, unencrypted form.
- a conversion unit 80 which, in an otherwise known manner, generates a volume document 82 corresponding to the encrypted version from the volume data of the storage unit 76, and from the index or reconstruction data of the storage unit 74 an independently executable within the framework of a suitable execution environment Structure description, script, e.g. as
- the file 84 can be stored as a reconstruction file in the reconstruction data storage unit 26 (FIG. 1), the file 82 in the document server 20.
- the embodiment shown schematically in FIG. 2 is suitable not only for generating a key file for the storage unit 74 (or as an executable script file 84), but also a plurality of these, of which, however, ideally only one actually leads to a correct result, while key files other than scripts trigger a decryption process, which also leads to a meaningful (and thus apparently correct) result, but the content does not match the original version. This then results in a further increase in the security against encryption.
- the present invention is not limited to the exemplary example of text files. It is therefore particularly appropriate to encrypt any further electronic documents in the manner described in principle, as long as these electronic documents have a structure of content components that is suitable for the basic operations of exchanging, removing, adding or exchanging.
- Typical applications are in particular music files, which are usually available in MP3 format, and where it is possible within the scope of the present invention to obtain the data structures (so-called frames) specified by the MP3 format individually or in blocks (ideally also in cycles or sections) for the respective piece of music) to be exchanged, removed or exchanged.
- a reconstruction file in particular in the form of a script or the like, is available in an ASCII and / or HTML file format.
- this offers simplified options for penetrating such a firewall without being disturbed.
- a further, advantageous development of the invention provides for a reconstruction file to be suitably embedded in electronic document data (of the same or a different file type) in such a way that the format and (reproduced) content of such a guest file remain unchanged;
- a reconstruction file to be suitably embedded in electronic document data (of the same or a different file type) in such a way that the format and (reproduced) content of such a guest file remain unchanged;
- the possibility of realizing the reconstruction files according to the invention as scripts offers numerous possibilities for further development: for example, the script-controlled merging within the scope of the present invention enables further flexibility or further increase in security by not only restoring a script file as a reconstruction file enables unencrypted form of the electronic document by merging, but a plurality of scripts as reconstruction files is necessary, which, for example Cover predetermined time periods of the electronic document and then call them up successively.
- the invention could be implemented here in such a way that a script file as a reconstruction file for a period of about 30 seconds of an MP3 music piece enables reconstruction, and then a further reconstruction allows (again script-controlled) a subsequent, further script file to be called up Reconstruction is necessary.
- a context-dependent generation or reconstruction of the original original document including even the possibility to restore different variants of the original document in a context-dependent and targeted manner.
- the invention thus achieves the fact that an organization system for electronic documents distributed over an electronic data network is created, which takes into account the interests of the authorized providers of the documents much better than is the case with the conventional, uncontrolled and uncontrollable distribution of files.
- the invention can also be used with common, otherwise known identification and authentication methods.
- the present invention is particularly relevant for pieces of music, since the music industry sees the free, uncontrolled distribution of MP3 data via the Internet as an existential threat to their business survival.
- the new music formats favored by the music industry on the other hand, have no additional security technology and access technology. Chen advantages for the user.
- the biggest disadvantage is that the files protected in this way are easily recognizable and, compared to MP3 files, have disadvantages in terms of usability, so that when the user decides which file to download, the protected file data is avoided allowed. This decision of the user is favored by the fact that it is clear to the user and before the download, what an unprotected file and what a protected file is.
- the object of the invention was not to completely suppress the illegal use of copyrighted data. Rather, the intention of the invention is to change the setting of the user in such a way that the use of easily downloadable data is questioned and the reliable (and not further questioned) use of data of unclear origin is always to be questioned.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Accounting & Taxation (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Computer Graphics (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19950267 | 1999-10-18 | ||
DE19950267A DE19950267C2 (de) | 1999-10-18 | 1999-10-18 | Vorrichtung und Verfahren zum kopiergeschützten Verteilen elektronischer Dokumente |
DE20010200U DE20010200U1 (de) | 2000-06-09 | 2000-06-09 | Vorrichtung zum Entschlüsseln eines verschlüsselten elektronischen Dokuments |
DE20010200U | 2000-06-09 | ||
PCT/EP2000/010256 WO2001030080A1 (de) | 1999-10-18 | 2000-10-18 | Vorrichtung und verfahren zum kopiergeschützten verteilen elektronischer dokumente |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1224807A1 true EP1224807A1 (de) | 2002-07-24 |
EP1224807B1 EP1224807B1 (de) | 2004-08-18 |
Family
ID=26055302
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP00974412A Expired - Lifetime EP1224807B1 (de) | 1999-10-18 | 2000-10-18 | Vorrichtung und verfahren zum kopiergeschützten verteilen elektronischer dokumente |
Country Status (4)
Country | Link |
---|---|
US (1) | US20030195854A1 (de) |
EP (1) | EP1224807B1 (de) |
DE (1) | DE50007512D1 (de) |
WO (1) | WO2001030080A1 (de) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020165934A1 (en) * | 2001-05-03 | 2002-11-07 | Conrad Jeffrey Richard | Displaying a subset of network nodes based on discovered attributes |
EP1436682B1 (de) * | 2001-06-15 | 2015-09-02 | Link Us All, Llc | System und verfahren zur spezifizierung von sicherheit, geheimhaltung und zugriffskontrolle auf information, die bei einer dritten partei benutzt werden |
US20030110449A1 (en) * | 2001-12-11 | 2003-06-12 | Wolfe Donald P. | Method and system of editing web site |
JP2004038851A (ja) * | 2002-07-08 | 2004-02-05 | Shinano Kenshi Co Ltd | ネットワークによるデジタル録音図書の配信システム |
AU2003259561A1 (en) * | 2002-08-28 | 2004-03-29 | Matsushita Electric Industrial Co., Ltd. | Content duplication management system and networked apparatus |
KR100503066B1 (ko) * | 2002-09-14 | 2005-07-21 | 삼성전자주식회사 | 음악 파일 저장 및 재생 장치와 그 방법 |
US20050010616A1 (en) * | 2003-07-09 | 2005-01-13 | Burks David P. | System and method for restoring files |
EP1580929A1 (de) * | 2004-03-26 | 2005-09-28 | Alcatel | Leistungsüberwachung von transparenten LAN-Diensten |
US7747864B2 (en) * | 2006-06-29 | 2010-06-29 | Mircosoft Corporation | DVD identification and managed copy authorization |
DE102007027019A1 (de) | 2007-06-08 | 2008-12-11 | Wittkötter, Erland, Dr. | Vorrichtung und Verfahren zur clientseitigen Freigabe elektronischer Dokumente |
US20120066711A1 (en) | 2009-08-24 | 2012-03-15 | Novara Technology, LLC | Virtualized home theater service |
US20140164439A1 (en) * | 2012-12-10 | 2014-06-12 | Kenneth Allen Gale | Multi-tiered database for personal data |
CN105745585B (zh) * | 2013-11-26 | 2018-05-08 | 西门子公司 | 卸载人机交互任务 |
US10080047B1 (en) * | 2017-05-05 | 2018-09-18 | Wayne D. Lonstein | Methods for identifying, disrupting and monetizing the illegal sharing and viewing of digital and analog streaming content |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3615255A1 (de) * | 1986-05-06 | 1987-11-12 | Hilberg Wolfgang | Anordnung zum verschluesseln und entschluesseln von informationen |
US6073124A (en) * | 1997-01-29 | 2000-06-06 | Shopnow.Com Inc. | Method and system for securely incorporating electronic information into an online purchasing application |
DE19907964C1 (de) * | 1999-02-24 | 2000-08-10 | Fraunhofer Ges Forschung | Vorrichtung und Verfahren zum Erzeugen eines verschlüsselten Datenstroms und Vorrichtung und Verfahren zum Erzeugen eines entschlüsselten Audio- und/oder Videosignals |
DE19932703C2 (de) * | 1999-07-15 | 2001-06-13 | Erland Wittkoetter | Datenverarbeitungsvorrichtung |
AU2001259075A1 (en) * | 2000-04-17 | 2001-10-30 | Circadence Corporation | System and method for web serving |
-
2000
- 2000-10-18 DE DE50007512T patent/DE50007512D1/de not_active Expired - Fee Related
- 2000-10-18 EP EP00974412A patent/EP1224807B1/de not_active Expired - Lifetime
- 2000-10-18 WO PCT/EP2000/010256 patent/WO2001030080A1/de active IP Right Grant
-
2002
- 2002-04-16 US US10/123,266 patent/US20030195854A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO0130080A1 * |
Also Published As
Publication number | Publication date |
---|---|
EP1224807B1 (de) | 2004-08-18 |
US20030195854A1 (en) | 2003-10-16 |
DE50007512D1 (de) | 2004-09-23 |
WO2001030080A1 (de) | 2001-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69736696T2 (de) | Netzwerk-Daten-Ubertragungssystem | |
DE60201662T2 (de) | Zugriffssteuerung auf gesicherten digitalen inhalt | |
DE60212920T2 (de) | Verfahren und system zur verwaltung von digitalen abonnementrechten | |
DE102006027030A1 (de) | Vorrichtung und Verfahren zum geschützten Verteilen elektronischer Dokumente | |
EP1652053B1 (de) | Verfahren zum bereitstellen einer virtuellen ware an dritte | |
DE69528408T2 (de) | Verfahren und Vorrichtung, die es ermöglicht, Software zu erproben und Software-Objekte zu liefern | |
DE69620112T2 (de) | Informationsdienstprozessor | |
WO2004015952A2 (de) | Vorrichtung zum kopiergeschützten verteilen elektronischer dokumente | |
DE60127689T2 (de) | Verwendung eingebetteter daten mit datei-sharing | |
EP1224807B1 (de) | Vorrichtung und verfahren zum kopiergeschützten verteilen elektronischer dokumente | |
WO2006119722A1 (de) | Verfahren zur verbreitung von mit drm belegten digitalen inhalten | |
DE102006044299A1 (de) | Vorrichtung und Verfahren zur gesicherten Verteilung von Inhalten in einem Telekommunikationsnetzwerk | |
WO1997050248A1 (de) | Verschlüsselung und entschlüsselung von multimediadaten | |
DE60114069T2 (de) | System und Verfahren für den Schutz von Digitalwerken | |
WO2003060905A1 (de) | System und verfahren zur erstellung und verbreitung kopier- und nutzungsgeschützter elektronischer ton- und bildmedien und deren dateninhalte | |
EP1002262B1 (de) | Vorrichtung und verfahren zur geschützten ausgabe elektronisch übertragener und gespeicherter dokumente | |
DE19950267C2 (de) | Vorrichtung und Verfahren zum kopiergeschützten Verteilen elektronischer Dokumente | |
DE102007027019A1 (de) | Vorrichtung und Verfahren zur clientseitigen Freigabe elektronischer Dokumente | |
EP1468351A2 (de) | Verfahren sowie eine anordnung zur abrechnung der urheberabgabe | |
DE69710789T2 (de) | Vorrichtung und verfahren zur geschützten übertragung und darstellung von elektronisch publizierten dokumenten | |
WO2006087290A2 (de) | Distributionssystem für daten eines dienstes | |
DE19959442C2 (de) | Verfahren und Anordnung zur Übertragung von Daten und/oder Informationen und/oder Signalen, insbesondere dynamischen Inhalts, und deren Verwendung | |
EP1469658A2 (de) | Verfahren zum Schutz von Daten gegen unberechtigte Benutzung auf einem Mobilfunkgerät | |
DE102006005178A1 (de) | Verfahren zur Schutzkennzeichnung von Daten | |
EP1497762A2 (de) | Verfahren zur kennzeichnung einer virtuellen ware und vorrichtung zur bereitstellung einer kennzeichnung für eine virtuelle ware |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20020516 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: BRAINSHIELD TECHNOLOGIES, INC. |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: WITTKOETTER, ERLAND, DR. |
|
17Q | First examination report despatched |
Effective date: 20021210 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB SE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20040818 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: GERMAN |
|
REF | Corresponds to: |
Ref document number: 50007512 Country of ref document: DE Date of ref document: 20040923 Kind code of ref document: P |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20041118 |
|
LTIE | Lt: invalidation of european patent or patent extension |
Effective date: 20040818 |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 20050126 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FD4D |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20050519 |
|
EN | Fr: translation not filed | ||
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20081222 Year of fee payment: 9 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20081126 Year of fee payment: 9 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100501 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20091018 |